Skip to main content

Development of Crossover and Encryption Based Text Steganography (CEBTS) Technique

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 298))

Abstract

This paper presents new text steganography approach named as Crossover Encryption Based Text Steganography (CEBTS) approach. This approach is a combination of random character sequence and feature coding method. In this approach in order to hide the secrete message, we first encrypt the message and then mix it in the cover text. Cover text is generated by random character sequence. In this approach the key is generated from the very first three character of the cover text by using crossover technique between these three characters. This generated key will be used to encrypt the plain text and this key will also used to decide that how the encrypted message will hide with cover text. For this approach we have developed two algrithms, one is for key generation using crossover technique and then encrypt the message using this key and hide the encrypted message into cover text using this key and second is used to retrieve the secrete message. We are also presenting comparison of our proposed approach with some of the previous popular text steganographic approaches with execution time and also the length of cover text which will be required to encipher using n bit cover text. At the last in our conclusion section we are showing that how our approaches are performing best in the existing approaches.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chaudhary S, Mathur P, Kumar T (2013) A capital shape alphabet encoding (CASE) based text steganography. In: Sharma R (ed) Conference on advances in communication and control systems 2013 (CAC2S 2013), India

    Google Scholar 

  2. Agarwal M (2013) An efficient dual text steganographic approach: hiding data in a list of words. In: Computer networks and communications (NetCom), vol 131. Lecture notes in electrical engineering Springer, New York

    Google Scholar 

  3. Shirali-Shahreza M (2008) Text steganography by changing words spelling. In: 10th IEEE international conference on advanced communication technology, Korea

    Google Scholar 

  4. Shirali-Shahreza M, Shirali-Shahreza MH (2007) Text steganography in SMS. In: IEEE international conference on convergence information technology

    Google Scholar 

  5. Khan F (2009) Enhanced text steganography in SMS. In: 2nd IEEE international conference on computer, control and communication

    Google Scholar 

  6. Shirali-Shahreza M, Shirali-Shahreza MH (2006) A new approach to Persian/Arabic text steganography. In: 5th IEEE/ACIS international conference on computer and information science (ICIS COMSAk’06), pp 310–315

    Google Scholar 

  7. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4):313–336

    Article  Google Scholar 

  8. Alla K, Shivramprasad R (2009) An evolution of Hindi text steganography. In: 6th IEEE international conference on information technology

    Google Scholar 

  9. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security & Privacy, pp. 32-44, May/June 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tarun Kumar , Abhinav Pareek or Jyoti Kirori .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Kumar, T., Pareek, A., Kirori, J., Nehra, M.S. (2014). Development of Crossover and Encryption Based Text Steganography (CEBTS) Technique. In: Sengupta, S., Das, K., Khan, G. (eds) Emerging Trends in Computing and Communication. Lecture Notes in Electrical Engineering, vol 298. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1817-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1817-3_12

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1816-6

  • Online ISBN: 978-81-322-1817-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics